Cheating detection and cheater identification in CRT-based secret sharing schemes
| dc.contributor.author | Pasailă, Daniel | |
| dc.contributor.author | Alexa, Vlad | |
| dc.contributor.author | Iftene, Sorin | |
| dc.date.accessioned | 2018-12-12T12:24:33Z | |
| dc.date.available | 2018-12-12T12:24:33Z | |
| dc.date.issued | 2010 | |
| dc.description.abstract | In this paper we analyze the cheating detection and cheater identification problems for the secret sharing schemes based on the Chinese remainder theorem (CRT), more exactly for Mignotte [1] and Asmuth-Bloom [2] schemes. We prove that the majority of the solutions for Shamir’s scheme [3] can be translated to these schemes and, moreover, there are some interesting specific solutions. | uk_UA |
| dc.identifier.citation | Pasailă, D. Cheating detection and cheater identification in CRT-based secret sharing schemes [Text] / Daniel Pasailă, Vlad Alexa, Sorin Iftene // Computing = Комп’ютинг. - 2010. - Vol. 9, is. 2. - P. 107-117. | uk_UA |
| dc.identifier.uri | http://dspace.tneu.edu.ua/handle/316497/32194 | |
| dc.publisher | ТНЕУ | uk_UA |
| dc.subject | secret sharing | uk_UA |
| dc.subject | Chinese remainder theorem | uk_UA |
| dc.subject | cheater detection | uk_UA |
| dc.subject | cheater identification | uk_UA |
| dc.title | Cheating detection and cheater identification in CRT-based secret sharing schemes | uk_UA |
| dc.type | Article | uk_UA |